You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This comprehensively updated second edition provides an introduction to the political, normative, technological and strategic aspects of nuclear weaponry. It offers an accessible overview of the concept of nuclear weapons, outlines how thinking about these weapons has developed and considers how nuclear threats can continue to be managed in the future. This book will help you to understand what nuclear weapons are, the science behind their creation and operation, why states build them in the first place, and whether it will be possible for the world to banish these weapons entirely. Essential reading for all students of International Relations, Security Studies and Military History.
"Examines the history and effectiveness of US efforts to prevent the spread of nuclear weapons"--
During the Cold War, deterrence theory was the cornerstone of U.S. foreign policy. Following the 9/11 terrorist attacks, however, popular wisdom dictated that terrorist organizations and radical fanatics could not be deterred—and governments shifted their attention to combating terrorism rather than deterring it. This book challenges that prevailing assumption and offers insight as to when and where terrorism can be deterred. It first identifies how and where theories of deterrence apply to counterterrorism, highlighting how traditional and less-traditional notions of deterrence can be applied to evolving terrorist threats. It then applies these theoretical propositions to real-world threats to establish the role deterrence has within a dynamic counterterrorism strategy—and to identify how metrics can be created for measuring the success of terrorism deterrence strategies. In sum, it provides a foundation for developing effective counterterrorism policies to help states contain or curtail the terrorism challenges they face.
Young women bound for Islamic State, or "Free Speech" protests for Tommy Robinson--radicalization spans ideologies. Though an often-used term, the process of radicalization is not well understood, and the role of gender within it is often ignored. This book reveals the centrality of gender to radicalization, using primary research among two of Britain's key extremist movements: the banned Islamist group al-Muhajiroun, and those networked to it; and the anti-Islam radical right, including the English Defence League and Britain First. Through interviews with leaders including Anjem Choudary, Jayda Fransen and Tommy Robinson, as well as their followers, Elizabeth Pearson explores the making of ...
Over 1,600 total pages ... CONTENTS: AN OPEN SOURCE APPROACH TO SOCIAL MEDIA DATA GATHERING Open Source Intelligence – Doctrine’s Neglected Child (Unclassified) Aggregation Techniques to Characterize Social Networks Open Source Intelligence (OSINT): Issues for Congress A BURNING NEED TO KNOW: THE USE OF OPEN SOURCE INTELLIGENCE IN THE FIRE SERVICE Balancing Social Media with Operations Security (OPSEC) in the 21st Century Sailing the Sea of OSINT in the Information Age Social Media: Valuable Tools in Today‘s Operational Environment ENHANCING A WEB CRAWLER WITH ARABIC SEARCH CAPABILITY UTILIZING SOCIAL MEDIA TO FURTHER THE NATIONWIDE SUSPICIOUS ACTIVITY REPORTING INITIATIVE THE WHO, WHAT AND HOW OF SOCIAL MEDIA EXPLOITATION FOR A COMBATANT COMMANDER Open Source Cybersecurity for the 21st Century UNAUTHORIZED DISCLOSURE: CAN BEHAVIORAL INDICATORS HELP PREDICT WHO WILL COMMIT UNAUTHORIZED DISCLOSURE OF CLASSIFIED NATIONAL SECURITY INFORMATION? ATP 2-22.9 Open-Source Intelligence NTTP 3-13.3M OPERATIONS SECURITY (OPSEC) FM 2-22.3 HUMAN INTELLIGENCE COLLECTOR OPERATIONS
The archetype of 'my enemy's enemy is my friend', India's political and economic presence in Afghanistan is often viewed as a Machiavellian ploy aimed against Pakistan. Challenging deeply held beliefs about an India-Pakistan proxy war, this work offers a nuanced explanation of India's strategic intent and actions, which is critical to resolving the seemingly unending war in Afghanistan, as well as wider bilateral disputes between the two South Asian rivals
This authoritative volume assesses how the recently democratized political system in Poland is adapting to the challenges posed by the country's adhesion to NATO which it joined in 1999. The contributors analyse Poland's performance as a newcomer.
During much of the Cold War, America's first line of defense was in outer space: a network of secret satellites that could provide instant warning of an enemy missile launch. The presence of these infrared sensors orbiting 22,000 miles above the earth discouraged a Soviet first strike and stabilized international relations between the superpowers, and they now play a crucial role in monitoring the missile programs of China, India, and other emerging nuclear powers. Jeffrey Richelson has written the first comprehensive history of this vital program, tracing its evolution from the late 1950s to the present. He puts Defense Support Program operations in the context of world events - from Russian missile programs to the Gulf War - and explains how DSP's infrared sensors are used to detect meteorites, monitor forest fires, and even gather industrial intelligence by "seeing" the lights of steel mills.
This is an important and worthwhile book that should be read by anyone seeking to understand the history and evolution of political violence in Southeast Asia, including the origins of contemporary militant Islamist terrorism. Paul J. Smith, Contemporary Southeast Asia This very fine collection shows how and why Southeast Asia has been afflicted with terrorism from the end of World War II to the present time. No other volume tells us as much about the period and area. Anyone interested in the general theory and practice of terrorism and insurgency will find it indispensable. David C. Rapoport, University of California, Los Angeles, US and Editor of Journal of Terrorism and Political Violence...